Synopsis

The Unwanted Gazeis an important book about one of the most pressing issues of our day: how changes in technology and the law have combined to demolish our rights of privacy, and what we can and must do to re-secure them.

In a world in which Ken Starr can subpoena Monica Lewinsky?s bookstore receipts and deleted e-mail messages can be used as justification for firing employees, it?s clear that private information of all kinds can be taken out of context and wielded against us. Where exactly did our constitutional guarantees on privacy go? In superbly lucid prose, Jeffrey Rosen tells not only where those privacy rights went but also how we can get them back. The Unwanted Gaze is utterly indispensable for anyone who cares about the future of his or her private life.

Excerpt

Prologue

The Unwanted Gaze

This book began as an effort to understand the constitutional, legal, and political drama that culminated in the impeachment and acquittal of President Bill Clinton. But that strange and singular confluence of events prompted me to think about the Clinton impeachment as a window onto a less unusual phenomenon that affects all Americans: namely, the erosion of privacy, at home, at work, and in cyberspace, so that intimate personal informationâ€”from diaries, e-mail, and computer files to records of the books we read and the Web sites we browseâ€”is increasingly vulnerable to being wrenched out of context and exposed to the world. What follows is an attempt to explore the legal, technological, and cultural changes that have undermined our ability to control how much information about ourselves is communicated to others. I would also like to consider ways of reconstructing some of the zones of privacy that law and technology have been allowed to invade.

In January of 1998, when Kenneth Starr began to examine allegations that President Clinton had lied under oath about an adulterous affair, I became interested in trying to identify the legal forces that converged in Paula Jonesâ€™s sexual harassment suit and in the subsequent impeachment investigation. Why, for example, were Jonesâ€™s lawyers permitted to go on a fishing expedition into the Presidentâ€™s sexual history, asking him to identify all the women with whom he had sexual relations as governor and president? Merely by accusing Clinton of an unwanted advance, Jones was able to violate not only his privacy but also that of Monica Lewinsky, who was forced to describe her own consensual sexual activities under oath. How could the law permit such unreasonable searches, in which the investigation of the offense seemed more invasive than the offense itself?

The invasions of privacy continued to multiply during the Starr investigation and the impeachment trial that followed. Many examples of the erosion of privacy by means of technology seemed to sit uneasily with the publicâ€”the DNA testing, the retrieval of e-mails that Lewinsky and a friend had tried unsuccessfully to delete, the tape recordings, the release of the secret grand jury transcripts on the Internet. But Lewinsky herself was especially unsettled by Starrâ€™s decision to subpoena a Washington bookstore for receipts of all of her book purchases since 1995. In her memoir, Lewinsky pointed to the bookstore subpoenas as one of the most invasive moments in the Starr investigation, along with the moment when prosecutors retrieved from her home computer the love letters that she had drafted, but never sent, to the President. â€œIt was such a violation,â€? she complained to her biographer, Andrew Morton. â€œIt seemed that everyone in America had rights except for Monica Lewinsky. I felt like I wasnâ€™t a citizen of this country anymore.â€?1

Monica Lewinsky is an improbable spokesperson for the virtues of reticence, but her ordeal raises deep questions about recent changes in law and technology that threaten individual control over personal information. In the late eighteenth century, the spectacle of state agents breaking into a suspectâ€™s home and rummaging through his or her private diaries was con- sidered the paradigm case of the unreasonable searches and seizures that the framers of the Bill of Rights intended to forbid. In the most famous essay on privacy ever written, published in the Harvard Law Review in 1890, Louis D. Brandeis, the future Supreme Court justice, and Samuel D. Warren, his former law partner, announced confidently that â€œthe common law secures to each individual the right of determining, ordinarily, to what extent his thoughts, sentiments, and emotions shall be communicated to others.â€? The legal principle that prevented prosecutors from scrutinizing diaries, letters, books, and private papers, Warren and Brandeis wrote, was the same principle that, in their view, should prevent gossip columnists from writing about the sex lives of citizens. They called that principle the right to an â€œinviolate personalityâ€? and said that it was part of the more general â€œright to be let alone.â€?

In asserting a right to privacy that could constrain the press, the two lawyers were treading on adventurous ground; yet it was a matter of general agreement, in the 1890s, that the Constitution prohibited prosecutors and civil plaintiffs from rummaging through private papers in search of sexual secrets or anything else. How, then, could that consensus have eroded to the point that Lewinskyâ€™s unsent love letters could be retrieved from her home computer? Part of the answer, I will argue, has to do with an unfortunate confluence of decisions by the Supreme Court. The legal forces that culminated in the Clinton impeachmentâ€”in particular, the erosion of privacy law, embodied in Fourth and Fifth Amendment protections for individual control over personal information, and the expansion of sexual harassment law, to a point where people can be interrogated about the details of their consensual relationships on the flimsiest of allegationsâ€”are the product of surprisingly recent Supreme Court decisions. It was during the 1970s and 1980s, for example, that the principle that private diaries couldnâ€™t be subpoenaed as â€œmere evidenceâ€? in civil or white-collar criminal cases was quietly allowed to wither away. And it was during the 1980s and 1990s that the Supreme Court recognized sexually explicit speech and conduct that created a â€œhostile or offensive working environmentâ€? as a form of gender discrimination, a development that made it increasingly difficult for lower courts and employers to distinguish consensual affairs from illegal forms of sexual coercion.

The Lewinsky investigation might never have occurred, however, if these two unfortunate legal trends hadnâ€™t converged with a third novel and illiberal law: the Independent Counsel Act, which encouraged a level of inquisitorial zeal in which ordinary prosecutorsâ€”constrained, as they are, by time, money, and public accountabilityâ€”are less likely to indulge. Now that both political parties have experienced the excesses of monomaniacal independent counsels, that law, mercifully, has been allowed to expire. But like a blinding klieg light that exposes the fissures in every surface on which it is turned, the independent counsel law served the jarring yet useful purpose of revealing the fault lines in the legal and technological protections for privacy today.

A hundred years ago, Brandeis and Warren worried that changes in technology as well as law were altering the nature of privacy. â€œInstantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life, and numerous mechanical devices threaten to make good the prediction that â€˜what is whispered in the closet shall be proclaimed from the housetops,â€™ â€? they wrote. But it was not, in fact, the desire to be let alone that motivated Brandeis and Warren to write their famous article; it was instead the desire to restrict discussion of an intimate family event to the sympathetic boundaries of their own social circle. What outraged Brandeis and Warren was a mild society item in the Boston Saturday Evening Gazette that described a lavish breakfast party Warren himself had put on for his daughterâ€™s wedding. Although the information itself wasnâ€™t inherently salacious, Brandeis and Warren were appalled that a domestic ceremony would be described in a gossip column and discussed by strangers. For this reason, they conceived of privacy in geographic or spatial terms. The press, they wrote, was â€œoversteppingâ€? the â€œbounds of propriety and of decency,â€? and intruding on â€œthe domestic circle.â€?

At the beginning of the twenty-first century, new technologies of communication have increased the danger that intimate personal information originally disclosed to our friends and colleagues may be exposed toâ€”and misinterpreted byâ€”a less understanding audience. For as thinking and writing increasingly take place in cyberspace, the part of our life that can be monitored and searched has vastly expanded. E-mail, even after it is ostensibly deleted, becomes a permanent record that can be resurrected by employers or prosecutors at any point in the future. On the Internet, every Web site we visit, every store we browse in, every magazine we skim, and the amount of time we spend skimming it, create electronic footprints that increasingly can be traced back to us, revealing detailed patterns about our tastes, preferences, and intimate thoughts. A friend who runs a Web site for political junkies recently sent me the â€œdata trailâ€? statistics that he receives each week. They disclose not only the Internet addresses of individual browsers who visit his site, clearly identifying their universities and corporate employers, but also the Web sites each user visited previously and the articles he or she downloaded there. Amazon.com has announced a similarly creepy feature that uses zip codes and domain names to identify the most popular books purchased on-line by employees at prominent corporations. (The top choice at Charles Schwab: Memoirs of a Geisha.)2 And under pressure from jittery investors, DoubleClick Inc., the Internetâ€™s largest advertising company, had to delay a plan to create elaborate dossiers linking usersâ€™ on-line and off-line browsing habits with their actual identities.

The sense of violation that Monica Lewinsky and the DoubleClick and amazon.com customers experienced when their reading habits were exposed points to a central value of privacy that I want to explore in this book. Privacy protects us from being misdefined and judged out of context in a world of short attention spans, a world in which information can easily be confused with knowledge. True knowledge of another person is the culmination of a slow process of mutual revelation. It requires the gradual setting aside of social masks, the incremental building of trust, which leads to the exchange of personal disclosures. It cannot be rushed; this is why, after intemperate self-revelation in the heat of passion, one may feel something close to self-betrayal. True knowledge of another person, in all of his or her complexity, can be achieved only with a handful of friends, lovers, or family members. In order to flourish, the intimate relationships on which true knowledge of another person depends need space as well as time: sanctuaries from the gaze of the crowd in which slow mutual self-disclosure is possible.

About Jeffrey Rosen

Jeffrey Rosen is an associate professor at the George Washington University Law School and legal affairs editor of The New Republic. He is a graduate of Harvard College; Balliol College, Oxford, where he was a Marshall Scholar; and Yale Law School. His essays and book reviews have appeared in many publications, including The New York Times Magazine and The New Yorker. He lives in Washington, D.C.

Praise

Praise

"Brilliant and haunting…a pleasure to read."–TheWashington Post Book World

“Rosen makes a complex subject fascinating by showing us how vulnerable we all are. His message: Pay attention. It could happen to you.”–The Denver Post

“This remarkably rich and detailed book sharpens our understanding of a problem that most of us prefer not to think about.”–The New York Times Book Review